Blog

enterprise security

Cybersecurity Awareness Month: Why cybersecurity should be taken seriously?

  • 74
    Shares
 October 20, 2016
cybersecurity

Estimated reading time: 2 minutes

October is earmarked as Cybersecurity Awareness month in the US in order to make internet users vigilant of the various possible cybercrimes. Today the world is connected via the internet and people practically live online with the help of facilities such as banking, mailing, shopping etc. available right at their...

Enterprise Wi-Fi Security: One Password isn’t Enough

 April 9, 2014

Estimated reading time: 3 minutes

The widespread adoption of Wi-Fi network connectivity by enterprises and IT departments worldwide has now exposed enterprise networks to a new dimension of vulnerability in the form of wireless hackers and casual intruders. Wireless connectivity certainly helps organizations connect their devices more efficiently and it also improves their bottom line...

How Security Savvy are Your Staff?

 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....

Why a Simple Antivirus Isn’t Enough for Small and Midsize Businesses

 December 19, 2013

Estimated reading time: 2 minutes

Let’s make peace with the fact that if there is anything that small and midsize businesses are lax about is their IT security. And this what cyber crooks are good at capitalizing at. Instead of burning their energy into taking down big businesses (which general have good IT security defense...

Some Quick Tips to Keep your Endpoint Data Safe

 December 11, 2013

Estimated reading time: 2 minutes

Corporate cyber attacks have become a common parlance in the world of IT Security. A recent study done by RSA revealed the extent of loss incurred by firms of different nations hit by phishing attacks. The US had to gulp down a loss of $882 million, followed by Germany ($294...

India – the 4th Most Targeted Nation by Phishers!

 December 5, 2013

Estimated reading time: 3 minutes

In an earlier post, we had discussed how cyber attacks against India is increasing rampantly. In this post, we give you a brief about how phishing attacks are affecting Indian enterprises and what can be done to contain the problem. In Q3 of 2013 (July – September), about 1,25,212 phishing...

How Cyber Criminals are Using Small Enterprises to Attack their Real Targets

 October 30, 2013

Estimated reading time: 4 minutes

Small enterprises in America are increasingly targeted by cyber criminals based in China. It may seem that hackers are interested in their money or data, but the fact is, the waters are deeper than this. If you think that cyber crooks only have their eyes on big enterprises, then you...

This Week’s Read on the Latest IT Security News and Updates

 October 19, 2013

Estimated reading time: 2 minutes

Information Security’s Worth in India will be 25 crore this year In the wake of rising cyber threats, information security in the country will be fueled by an average of 25 crore in 2013. This is according to a State of Information Security Survey 2014, conducted by Pricewaterhouse Coopers (PwC),...

Best Practices for Enterprise IT Security

 August 21, 2013

Estimated reading time: 3 minutes

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud technology, social media platforms, and bring your own device (BYOD) to name a few. And when such is the scenario, ignoring the importance of IT security can spell disaster. Here, we have...

Protecting your Enterprise IT Security against Physical Threats

 August 14, 2013

Estimated reading time: 3 minutes

Whenever we talk of IT security, the first thing people look for is a security software. But what about physical intrusion? What about the physical security of the digital assets? Are they being safeguarded? Let us look what measures you must take to physically secure your network and its components....